Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Setting up pfSense and L3 switch

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 6 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      Wholelottapfsense
      last edited by

      Hi,

      I'm a newbie in networking and the learning curve has been steep but I find it very interesting and I am eager to learn. This is my first post and I've already been crawling through many threads on this forum to learn about setting up pfSense but I've got still some questions 😓

      I’d like to set up a network as illustrated below:

      Internet
      |
      | fiber
      |
      Fritzbox (provided by ISP): PPPoE passthrough, 500 Mbit/s down, 250 Mbit/s up
      |
      | 1 Gbit link
      |
      Supermicro SYS-5018D-FN8T: pfSense
      | port xgb0 (interface LAN): 172.168.0.1/30
      |
      | transit network (10 Gbit link between SFP+ ports)
      |
      | port 1/0/27: 172.168.0.2/30
      Netgear M4300-28G-PoE+ L3 switch
      |
      | Trunk tagged with different VLANs
      |
      Netgear L2 switch

      The Netgear L3 switch would be the downstream router, routing between VLANs and acting as DHCP server for the VLANs:
      VLAN 10: 192.168.10.0/24; SVI 192.168.10.254; (Win Server 2012, domain joined clients, trusted mobile devices)
      VLAN 20: 192.168.20.0/24; SVI 192.168.20.254; (VoIP)
      VLAN 30: 192.168.30.0/24; SVI 192.168.30.254; (IP cameras)
      VLAN 40: 192.168.40.0/24; SVI 192.168.40.254; (IoT)
      etc.

      What I would like to confirm/ask is:

      1. To create the transit network, I would:
        In the pfSense box: set the LAN interface to 172.168.0.1/30
        In the Netgear L3 switch: set port 1/0/27 to 172.168.0.2/30 via 'Routing > IP > Advanced > IP Interface Configuration' (p301 of http://www.downloads.netgear.com/files/GDC/M4300/M4300_M4300-96X_UM_EN.pdf).

      I guess I should enable ‘routing mode’ for port 1/0/27 (see p301 of manual)?

      Is it necessary to create a VLAN for the transit network?

      1. I should create a gateway in pfSense (System > Routing > Gateways) as follows:
        Interface: select ‘LAN’
        Check ‘Default gateway’
        Gateway: 172.168.0.2 (L3 switch)

      2. to allow internet access for the VLANs, I should set up a static route in pfSense (System > Routing > Static Routes) as follows:
        Network: 192.168.0.0/16
        Gateway: 172.168.0.2 (= L3 switch)

      3. I should set a default route in the L3 switch as follows:
        Network address: 0.0.0.0
        Subnet mask: 0.0.0.0
        Next hop address: 172.168.0.1 (= pfSense box)
        Is this sufficient for the L3 switch to know that it should route internet traffic via its 1/0/27 port to pfSense ?

      4. I would create a management VLAN 50: 192.168.50.248/29 and set management IP addresses e.g.:
        pfSense: 192.168.50.249
        L3 switch: 192.168.50.250
        L2 switch: 192.168.50.251
        Ubiquiti AC AP Pro 1: 192.168.50.252 (connected to L3 switch via trunk port)
        Ubiquiti AC AP Pro 2: 192.168.50.253 (connected to L3 switch via trunk port)

      Should I put the management VLAN as:

      • a tagged VLAN on the 10 Gbit uplink between the pfSense and the L3 switch
        or
      • an untagged VLAN between a 1 Gbit port of the pfSense and a 1 Gbit port of the L3 switch?

      I assume this would be the only VLAN to be created in the pfSense box (unless the transit network needs a VLAN (see question above))?

      1. Do I need to configure something in pfSense for NAT ?

      2. When configuring DHCP in the L3 switch for the different VLANs, I assume I can set pfSense (172.168.0.1) as the DNS server (I understood one sets public DNS servers during the initial configuration of pfSense) and the respective VLAN SVIs as the gateway?

      Did I forget anything (apart from setting ACLs in the L3 switch) ? 😵

      1 Reply Last reply Reply Quote 0
      • W
        Wholelottapfsense
        last edited by

        Nobody?

        Either I wrote total rubbish or it all looks quite allright ...

        Just want to avoid nasty surprises because my family members are allergic to prolonged internet outages 🙄

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by

          You have a needlessly complex design for a home network. Drop the transit network and L3 switch entirely. What's the point of doing that? pfSense can easily route and take care of tagged VLANs. If you have extra NIC ports on the pfSense box you can put the different VLANs each on their own physical interface, or you can use trunk ports.

          You are way over complicating this. If you want to experiment to see how hard you can make something, then go ahead and have fun. But if you are new to networking and want to implement this setup, then prepare for some network outages ... ☺

          W 1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            pfSense-Layer-3-Switch.png

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            W 1 Reply Last reply Reply Quote 1
            • W
              Wholelottapfsense @bmeeks
              last edited by

              @bmeeks said in Setting up pfSense and L3 switch:

              You have a needlessly complex design for a home network. Drop the transit network and L3 switch entirely. What's the point of doing that? pfSense can easily route and take care of tagged VLANs. If you have extra NIC ports on the pfSense box you can put the different VLANs each on their own physical interface, or you can use trunk ports.

              I thought of that design because my network is currently setup with the Fritzbox as modem/firewall and my L3 switch routing between VLANs.
              You are right, letting pfSense do the routing is going to make things easier - even though L3 switches are said to be more efficient in routing (but that's probably not noticeable in a home network). Creating rules in pfSense seems definitively more intuitive than the ACLs in the switch!

              Thanks for your feedback, I'll read up on the router on a stick approach.

              JKnottJ 1 Reply Last reply Reply Quote 0
              • W
                Wholelottapfsense @Derelict
                last edited by

                @Derelict Thanks for that graphic, which seems to confirm the approach in my first message.

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by bmeeks

                  @Derelict shows a way to implement your original design, but my question would still remain -- why? That's extremely complex for a home network.

                  Unless you use hardware so old it has an 8086 8 Mhz CPU in it, you will not tax pfSense running a gigabit home network. So the routing efficiency of a Layer 3 switch is not going to improve anything.

                  Just let the pfSense box do everything with your ISP-supplied box in passthrough or bridge mode so the pfSense WAN has your public IP address on it. Then create VLANs and/or physical interfaces for your LAN on the pfSense box. Let pfSense provide the DHCP and DNS services for your networks.

                  W 1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @Wholelottapfsense
                    last edited by

                    @Wholelottapfsense said in Setting up pfSense and L3 switch:

                    even though L3 switches are said to be more efficient in routing (but that's probably not noticeable in a home network)

                    Of course, passing through 2 devices, instead of just 1 will also be a performance hit.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    1 Reply Last reply Reply Quote 0
                    • W
                      Wholelottapfsense @bmeeks
                      last edited by Wholelottapfsense

                      @bmeeks said in Setting up pfSense and L3 switch:

                      @Derelict shows a way to implement your original design, but my question would still remain -- why? That's extremely complex for a home network.

                      Unless you use hardware so old it has an 8086 8 Mhz CPU in it, you will not tax pfSense running a gigabit home network. So the routing efficiency of a Layer 3 switch is not going to improve anything.

                      No, pfSense will be on a Supermicro 5018D-FN8T machine with an Intel Xeon D-1518 processor (2.2GHz, 4 cores), in which I'll put 8 Gb RAM.

                      In terms of network performance, my only wish is to have a 10 Gbit connection between my desktop and my server in VLAN 10 because I do a lot of video editing and copying of large video files between those 2 computers.

                      If I let pfSense take care of the routing as you suggested, I could reserve a 10 Gbit link between the SFP+ ports of the Supermicro 5018D-FN8T and the Netgear L3 switch for VLAN 10 and put the other VLANs on the other ports.

                      As explained before, the reason why my first idea was the option with the transit network is that my L3 switch is currently set up to handle the routing between VLANs (my Fritzbox modem/firewall can't handle VLANs) and I was thinking this would require less (re-)configuration when adding the pfSense box to the network. But I definitively see the advantages in your approach.

                      1 Reply Last reply Reply Quote 0
                      • H
                        Hugovsky
                        last edited by

                        Sometimes I like to overcomplicate my home network too. I use it to learn new things. Most of the time, I get back to previous design but, in the process, I've learned something and sometimes even stump on stupid errors made before. I love KISS technology but it's nice to go over the head sometimes. ;)

                        1 Reply Last reply Reply Quote 0
                        • R
                          richley88
                          last edited by

                          How did you create the transit network in the end Wholelottapfsense as I am trying to do the same thing and do not want to use the management VLAN?

                          1 Reply Last reply Reply Quote 0
                          • W
                            Wholelottapfsense
                            last edited by

                            I followed the advice of bmeeks and have the VLAN routing done by pfSense.

                            As my main goal was to ensure high throughput between my Server and domain joined clients (all on the same VLAN) and all of those devices are wired to the Netgear M4300-28G-PoE+ switch, the data is handled at L2 level by the switch and does therefore (to my understanding) not pass via the pfSense box.

                            In the end, I also ditched the ISP Fritzbox because I didn't manage to get PPPoE passthrough working; my ISP gave me a fiber to ethernet converter instead.

                            Everything has been working great ever since.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.